In one day last year, "NSA's Special Source Operations branch collected 444,743 e-mail address books from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail and 22,881 from unspecified other providers."

These figures are typical. They repeat daily. They add up. They "correspond to a rate of more than 250 million a year." .

NSA has access to about 500,000 buddy lists as well as huge numbers of web-based email accounts.

A previous article called NSA spying worse than you think. Rules followed are its own.

It can monitor virtually everyone everywhere electronically. Doing so is unconnected to terrorism or other national security concerns.

Big Brother has lots of other Brothers watching. They're making a list. They're checking it twice. They know who's naughty or nice.

They read your emails. They know what web sites you visit. They know your medical and financial history.

They know the company you keep. They watch every move you make. They know what you do, where and when.

They know when you're sleeping. They know when you're awake. They know when you're bad or good. They know secretly. They know intrusively.

They know because they can go where no previous spy agencies went before. They exceed their capabilities.

Perhaps one day they'll be able to anticipate things before they happen. Maybe they'll be able to read minds.

It focuses on hard-to-find terrorism targets. Considerable time and effort goes into doing it.

NSA's Alexander claims his mission is "noble." He lied again saying:

"Our job is to defend this nation and to protect our civil liberties and privacy."

He's way over-the-top out-of-control. He defends imperial lawlessness. He destroys civil liberties and privacy in the process.

Records indicate NSA "depends heavily on highly targeted network penetrations to gather information that wouldn’t otherwise be trapped in surveillance nets that it has set at key Internet gateways," said WaPo.

It assigned senior analysts to the CIA's Counterterrorism Center. Others work alongside CIA counterparts. They do so at almost all major US embassy and overseas military bases.

According to a former US intelligence official:

It "you wanted huge coverage of the FATA (Federally Administered Tribal Areas), NSA had 10 times the manpower, 20 times the budget, and 100 times the brainpower."

He compared NSA with CIA's Information Operations Center (IOC).

"NSA relies on increasingly sophisticated versions of online attacks that are well-known among security experts."

"Many rely on software implants developed by the agency's Tailored Access Operations division with code-names such as UNITEDRAKE and VALIDATOR."